Application Security News and Articles


Hillstone Networks unveils StoneOS 5.5R11 to enhance threat protection

Hillstone Networks has launched the latest version of its operating system, StoneOS 5.5R11. This update includes over 200 new functionalities and improvements designed to enhance threat protection and facilitate enterprise network operations in ...

LockBit, RansomHub Lead Ransomware Attacks in July

Global ransomware attacks surged by 19% in July compared to June, climbing from 331 to 395 incidents, according to the latest data from NCC Group. The post LockBit, RansomHub Lead Ransomware Attacks in July appeared first on Security Boulevard.

Kasada’s Releases 2024 State of Bot Mitigation Report

Annual survey reveals that 98% of organizations attacked by bots in the past year lost revenue, with more than one third losing over 5% of revenue to web scraping. The post Kasada’s Releases 2024 State of Bot Mitigation Report appeared first on ...

DTEX i³ Threat Advisory Reveals Growing Risk of Credential Abuse by Outside Adversaries

In today’s digital age, where the line between personal and professional life is increasingly blurred, the storage of corporate credentials on personal accounts has emerged as an attractive vector for outside adversaries. DTEX i3 has released a ...

How to Unify Your IT Strategy

The post How to Unify Your IT Strategy appeared first on Votiro. The post How to Unify Your IT Strategy appeared first on Security Boulevard.

RSA Authenticator App improves cybersecurity for federal agencies

RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to ...

Critical wpa_supplicant Vulnerability Addressed

A serious vulnerability has been discovered in the widely used wpa_supplicant package, potentially leaving millions of devices at risk. This flaw, tracked as CVE-2024-5290, poses a significant risk of privilege escalation, potentially allowing ...

TuxCare VP DeShea Witcher Honored as a 2024 Marketing Executive of the Year

The entire TuxCare team is pleased to congratulate vice president DeShea Witcher, as he was recently honored as a 2024 Marketing Executive of the Year as a silver Stevie winner in the 21st Annual International Business Awards®.   With more ...

5 Key Findings from the 2024 State of Bot Mitigation Survey

The 4th annual survey exclusively from the perspective of technology professionals who are already using anti-bot solutions at their companies. The post 5 Key Findings from the 2024 State of Bot Mitigation Survey appeared first on Security Boulevard.

Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining

A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In this article, we’ll dive into the details of the ...

UPI Security: Best Practices for a Safe Digital Experience

UPI has redefined digital transactions as hassle-free like none other in India. However, with the growing popularity of this method, security breaches have been on the rise. Protect your UPI transactions to make your digital experience secure. ...

Potential Surge in Cryptocurrency Leaks

Increase in Cryptocurrency Leaks After Trump Supports Bitcoin Recently, Constella Intelligence has observed an increase in attacks and data breaches resulting in cryptocurrency leaks. This surge could be partly attributed to comments made by ...

How to prioritize data privacy in core customer-facing systems

Evolving global data privacy regulations are keeping marketers on their toes. In April 2024, the American Privacy Rights Act (APRA) was introduced in the Senate. The proposed bill would create a federal consumer privacy framework akin to the ...

Behind the scenes of Serious Cryptography

In this Help Net Security interview, Jean-Philippe Aumasson, discusses the writing and research process for Serious Cryptography, his latest book. With a career steeped in research and practical cryptography, Aumasson offers a rare glimpse into ...

Half of enterprises suffer breaches despite heavy security investments

Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective ...

Lateral movement: Clearest sign of unfolding ransomware attack

44% of unfolding ransomware attacks were spotted during lateral movement, according to Barracuda Networks. 25% of incidents were detected when the attackers started writing or editing files, and 14% were unmasked by behavior that didn’t fit ...

Evolving Cybersecurity: Aligning Strategy with Business Growth

The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead ...

Gartner® Hype Cycle™ for Security Operations, 2024

While programs like CTEM may be upcoming, Gartner® Hype Cycle for Security Operations recommends making incremental shifts early on. The post Gartner® Hype Cycle™ for Security Operations, 2024 appeared first on SafeBreach. The post Gartner® ...

Axiad Takes a Leading Role in Microsoft’s FIDO Provisioning API Upgrade

At Axiad, we said a year ago that FIDO passkeys would likely become the gold... The post Axiad Takes a Leading Role in Microsoft’s FIDO Provisioning API Upgrade appeared first on Axiad. The post Axiad Takes a Leading Role in Microsoft’s FIDO ...

Bootstrapping Growth: How B2B SaaS Startups Can Thrive on a Shoestring Budget

Fuel your B2B SaaS startup's growth without breaking the bank! Learn proven bootstrapping strategies to attract customers, generate revenue, and scale sustainably, even on a tight budget. The post Bootstrapping Growth: How B2B SaaS Startups Can ...